CVE-2025-24003
Published: 08 July 2025
Summary
CVE-2025-24003 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Phoenixcontact Charx Sec-3000 Firmware. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of MQTT message inputs to prevent out-of-bounds writes and buffer overflows in the EichrechtAgents component.
Implements memory protection mechanisms such as stack canaries, ASLR, and DEP to mitigate exploitation of the buffer overflow vulnerability.
Ensures timely flaw remediation by applying patches for the specific buffer overflow in charging station EichrechtAgents as advised by CERT VDE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in network-accessible EichrechtAgents component via unauthenticated MQTT messages directly enables remote exploitation of a public-facing service.
NVD Description
An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging stations complying with German Calibration Law, resulting in a loss of integrity for only EichrechtAgents and potential denial-of-service for these stations.
Deeper analysisAI
CVE-2025-24003 is a buffer overflow vulnerability (CWE-120) affecting charging stations that comply with the German Calibration Law (Eichrecht). It enables unauthenticated remote attackers to trigger out-of-bounds writes via specially crafted MQTT messages, specifically targeting the EichrechtAgents component within these stations. The vulnerability has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H), highlighting its high severity due to network accessibility, low attack complexity, and lack of required privileges.
An unauthenticated attacker with network access to the charging station can exploit this flaw by sending malicious MQTT messages, leading to a loss of integrity in the EichrechtAgents (I:L) and potential denial-of-service conditions for the affected stations (A:H). No user interaction is required, and exploitation does not impact confidentiality, making it feasible for remote adversaries to disrupt calibration compliance and station availability without authentication.
For mitigation details, security practitioners should consult the primary advisory from CERT VDE at https://certvde.com/en/advisories/VDE-2025-014, published on 2025-07-08.
Details
- CWE(s)